Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Managing Messages > Controlling directory harvest attacks
Controlling directory harvest attacks
Administrator Help | Forcepoint Email Security | Version 8.5.x
A directory harvest attack is used by questionable sources to gain access to an organization's internal email accounts. A directory attack not only consumes large amounts of system resource but also, through the acquisition of email accounts, creates spam problems for email end users. With directory attack prevention settings, you can limit the maximum number of messages and connections coming from an IP address over a given time period. These settings are configured on the page Settings > Inbound/Outbound > Directory Attacks.
Configure directory attack control
1.
Navigate to the page Settings > Inbound/Outbound > Directory Attacks.
2.
Enable the directory harvest attack prevention function; mark the check box Limit the number of messages/connections per IP every.
3.
The default is 60 seconds.
4.
The default is 30.
5.
The default is 30.
6.
The default is 3 hours.
7.
*
The default is 5.
*
The default is 50%.
When these recipient limitations are exceeded, the connection is dropped automatically.
This option is available only when the recipient validation option is used (see Adding user authentication settings).
8.
The settings are saved.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Managing Messages > Controlling directory harvest attacks
Copyright 2022 Forcepoint. All rights reserved.